- effective from January 29, 2026
PLEASE READ THIS DATA PROCESSING AGREEMENT CAREFULLY. THIS DATA PROCESSING AGREEMENT GOVERNS THE TRANSFER AND PROCESSING OF PERSONAL DATA BY THE PROVIDER ON BEHALF OF THE USER AND IN CONNECTION WITH THE USERS USE OF THE DDD Invoices SERVICE. BY SETTING UP AN ACCOUNT AND CLICKING [SIGN UP] OR USING ANY OF THE DDD Invoices SERVICES WHICH DO NOT REQUIRE REGISTRATION, YOU AGREE TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO BE BOUND BY THIS AGREEMENT, YOU MAY NOT ACCESS OR INTERACT WITH THE DDD Invoices SERVICE.
This DDD Invoices Data Processing Agreement and its Appendices (hereinafter: “DPA”) reflects the parties’ agreement with respect to the Processing of Personal Data by the Provider (as the Processor) on behalf of the User (as the Controller) in connection with the Users’ use of the DDD Invoices Service, whereby all bolded terms are further defined below.
This DPA is supplemental to, and forms an integral and indispensable part of the DDD Invoices Terms of Service (hereinafter: “Terms” or “Agreement”) published on https://dddinvoices.com/terms-and-conditions, which apply to and govern the setting-up, use and access of the DDD Invoices Service.
This DPA is effective from the moment that the Provider and User enter into the Agreement as described in point 1.1. of said Agreement.
If you do not agree to the terms and clauses of this DPA or the Agreement, you are not authorised to validly register an account with us or authorised for using any of the DDD Invoices Services which do not require registration and accessing or using the DDD Invoices Service, you must immediately stop doing so.
In case of any conflict or inconsistency between the terms and clauses of this DPA and the terms and clauses of the Agreement, this DPA will take precedence over the terms and clauses of the Agreement to the extent of such conflict or inconsistency.
Terms not otherwise defined in this DPA will have the meaning as set forth in the Agreement.
All enquiries regarding this DPA may be directed at [email protected].
In this DPA all of the bolded terms shall have the same meaning as the defined terms from the Agreement, with the added inclusion of the following terms:
Agreement (also called Terms) shall mean the DDD Invoices Terms of Service published on https://dddinvoices.com/terms-and-conditions, which apply to all websites and services that are represented by the DDD Invoices (unregistered) trademark and govern the setting-up, use and access of the DDD Invoices Service and the https://dddinvoices.com/ website and under which certain Personal Data needs to be processed in accordance with this DPA.
DDD Invoices Data Processing Agreement (also called DPA) shall mean this legal agreement that you shall simultaneously enter into together with the Agreement when performing the actions from point 1.1. of the Agreement, and under which the Provider shall be deemed as the Processor and you shall be deemed as the Controller of any and all Personal Data that shall be sent, transmitted or transferred to the Provider directly or through the use of the DDD Invoices Service or the https://dddinvoices.com/ website for the performance of the Service by you or any third party. This DPA forms a supplemental, integral and indispensable part of the Agreement and your use of the DDD Invoices Service and the https://dddinvoices.com/ website, whereby this DPA is subject to the provisions of Article 28 of the GDPR.
Controller Personal Data shall mean any End User Personal Data or any other Personal Data, that the Provider or Subprocessor Processes or shall Process pursuant to or in connection with the Agreement.
Data processing (also Processing) means any operation or set of operations which is performed on Personal Data or on sets of Personal Data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. In the context of this DPA, the Provider shall Process the End User Data for which the User is deemed as the Controller in order to provide the Service.
European Economic Area (also called EEA) shall mean the EU Member States and Iceland, Liechtenstein, and Norway.
End User Personal data shall mean personal data which relates to a natural or natural persons belonging to a legal person that interacts with the DDD Invoices Service as well as any Third party individual personal data.
Subprocessor (or Contracted Subprocessor) shall mean any person (including any third party and any Provider Affiliate, but excluding an employee of the Provider or any of its subcontractors) appointed by or on behalf of the Provider or any Provider Affiliate to Process Personal Data on behalf of the Provider in connection with the Agreement.
Standard contractual clauses shall mean the standard data protection clauses for the transfer of Personal Data to Processors established in countries outside of the EEA, where an adequate level of data protection with regards to the GDPR is not ensured on a national and systemic level, as described in Article 46 of the GDPR.
You (also your, User, Controller) shall mean the legal entity that shall be identified as the registered user of the Service when you, the duly authorised individual representing said entity, register an account (i.e. perform the actions from point 1.1. in the name the company you represent) is bound to this Agreement and the DDD Invoices Data Processing Agreement in accordance with the terms herein. The aforementioned also relates to any and all Permitted Users, Personnel, or your User Affiliates. In the context of this DPA you shall be deemed as the Processor of Personal Data.
User Affiliate shall mean in respect of the User and his legal entity, any other legal entity or private person controlling the User or being controlled by the User, or acting under the direct influence or instructions of the User, whereby “being controlled by” shall mean the possession, directly or indirectly, solely or jointly with another person, of power to direct or cause the direction of the management or policies and actions of a legal or natural person (whether through the ownership of securities, other shareholders, partnership or ownership interest, by establishing total or partial identity of individuals in management, by contract or otherwise).
Words in the singular include the plural and vice versa. Including and similar words do not imply any limit.
A reference to the Applicable legislation or statute includes references to regulations, orders or notices made under or in connection with such legislation, statute or regulations and all amendments, replacements or other changes to any of them.
The Provider and each Provider Affiliate shall take reasonable steps to ensure the reliability of any employee, agent or contractor of any Contracted Processor who may have access to the Controller Personal Data, ensuring in each case that access is strictly limited to those individuals who need to know / access the relevant Controller Personal Data, as strictly necessary for the purposes of the Agreement, and to comply with Applicable legislation in the context of that individual's duties to the Contracted Processor, ensuring that all such individuals are subject to confidentiality undertakings or professional or statutory obligations of confidentiality.
The Provider and each Provider Affiliate shall provide reasonable assistance to the Controller with any data protection impact assessments, and prior consultations with supervising authorities or other competent data privacy authorities, which the Controller reasonably considers to be required under Article 35 or 36 of the GDPR or equivalent provisions of any other Applicable legislation, in each case solely in relation to the Processing of Controller Personal Data by, and taking into account the nature of the Processing and information available to, the Provider and the Contracted Processors.
Without prejudice to any applicable Standard contractual clauses which may have been entered into on the basis of this DPA:
With regard to the subject matter of this DPA and in the event of inconsistencies between the provisions of this DPA and any other agreements between the parties, including the Agreement and including (except where explicitly agreed otherwise in writing, signed on behalf of the parties) agreements entered into or purported to be entered into after the date of this DPA, the provisions of this DPA shall prevail.
Under or in connection with the Agreement, this DPA or any Standard contractual clauses which may have been concluded in connection with this DPA and regardless of the type of liability, the parties hereby agree, that the total combined liability of the Provider and the Provider Affiliate towards the Controller, the Controller Affiliate or towards both, shall be limited to limitations on liability or other liability caps agreed to by the parties in the Agreement.
The aforementioned shall not affect each parties liability to Data subjects under the GDPR or Applicable legislation or any Standard contractual clauses which may have been concluded in connection with this DPA so that such limitation of liability or liability cap would directly breach the GDPR or the Applicable legislation.
Should any provision of this DPA be invalid or unenforceable, then the remainder of this DPA shall remain valid and in force. The invalid or unenforceable provision shall be either (i) amended as necessary to ensure its validity and enforceability, while preserving the parties’ intentions as closely as possible or, if this is not possible, (ii) construed in a manner as if the invalid or unenforceable part had never been contained therein.
Appendix 1: DATA PROCESSING INSTRUCTIONS REGARDING THE PROCESSING OF CONTROLLER PERSONAL DATA IN CONNECTION WITH THE SERVICE & THE LIST OF APPROVED SUBPROCESSORS
Appendix 2: LIST OF TECHNICAL AND ORGANISATIONAL MEASURES OFFERED BY THE PROVIDER AND PROVIDER AFFILIATES FOR THE PROTECTION OF CONTROLLER PERSONAL DATA
This Appendix 1 includes certain details of the Processing of Controller Personal Data as required by Article 28(3) of the GDPR:
Method and purpose of data collection
In order to provide the Service as it is set out in the Agreement:
In both cases outlined above, the Provider is therefore instructed by the Controller under this DPA to collect, store and process the relevant End User Personal data so that the Service may deliver in automatically generated summaries or other Output data.
Categories of Data Subjects
The categories of Data Subjects whose Personal data may be Processed under this DPA are defined by the Controller and are as follows:
whereby the Controller expressly warrants to the Provider under the Agreement, that he had obtained the required consent for the processing of the Personal Data of any and all such Data Subjects.
Personal Data types and the subject-matter, nature and purpose of Processing
Subject to the Controller's use of the Service, the following Processing may be carried out by the Provider or his Subprocessors in order to provide each sought after feature of the Service:
| Categories of Personal Data Processed | Description of Processing Activities | Purposes of Processing & Types of Processing |
|---|---|---|
| Invoice and transaction data (issuer/recipient identification data, contact person details, invoice metadata, line items, tax data, references, notes, technical invoice metadata) | Processing of invoice data submitted by the Client through the Service or via API integration, including generation, validation, transmission, storage, retrieval, and archiving of electronic invoices. | To provide electronic invoicing services in accordance with the Agreement and Client instructions, including invoice issuance, transmission, compliance with tax rules, auditability, and document integrity. |
| Business contact data (names, email addresses, phone numbers of contact persons of issuers/recipients, where included by the Client) | Inclusion of contact data within invoice documents and related communications strictly as provided by the Client. | To enable correct identification of invoice parties and facilitate invoice-related communication initiated by the Client. |
| Technical and operational data (IP addresses, API credentials, authentication tokens, system logs, error logs, access logs, timestamps, device and integration identifiers) | Automatic processing of technical data generated during use of the Service and API integrations. | To ensure secure, reliable, and uninterrupted operation of the Service, including monitoring, troubleshooting, and incident prevention. |
| Usage and service performance data (usage statistics, transaction counts, system performance metrics) | Processing of aggregated or pseudonymised operational data related to the use of the Service. | To maintain, secure, and improve the Service, ensure capacity planning, and detect anomalies or abuse. |
| Backup and audit trail data (invoice versions, processing logs, status histories, recovery snapshots) | Creation and maintenance of backups, version history, and audit trails for invoice processing. | To ensure data integrity, traceability, business continuity, and disaster recovery in line with the Agreement. |
Timescales for the keeping of Personal Data and the duration of the Processing
The Provider will keep Personal Data for as long as it is necessary to fulfil the above-listed and shall delete and procure the deletion of all copies of stored Personal Data within 30 (thirty) business days of the date of termination of the Agreement (i.e. termination by either the Controller or the Provider under the applicable clauses of the Agreement).
The processing will continue for the duration of Controller’s use of the Service, whereby most Processing takes place instantly after initiation by the Controller via the User dashboard.
Entities involved in the Processing
The Personal Data shall be processed via automatic means by the algorithms and models of the Service (offered by the Provider alone or through its Subprocessors). Provider Personnel shall only process Personal Data upon Controller request or when performing job related tasks that require the Processing of data (i.e. troubleshooting and when planning our next update or analysing systemic issues that Controllers or Workspace members have reported).
Approved Subprocessors
The following Subprocessors are hereby jointly approved by the Controller in relation to their sub-processing of the data in the provision of the Service under this DPA.
In accordance with this DPA, the Provider is instructed by the Controller to transfer Personal Data to the listed Subprocessors:
| Subprocessor | Purpose and basis for processing | Country, location / protection of data |
|---|---|---|
| Contabo GmbH | Main service hosting and data storage. Processing of invoice data, technical data, and backups necessary for the operation and availability of the Service. Legal basis: Contractual – provision of the Service in accordance with the Agreement and Client instructions. | Subprocessor entity location: European Union. Server / processing location: European Union. Security measures: ISO 27001–aligned technical and organisational measures and data centre security controls implemented by the provider. |
| Cloudflare, Inc. | Public network security and performance. Processing of connection metadata (IP addresses, request headers, timestamps) for DDoS protection, firewalling, and traffic optimisation. Legal basis: Legitimate interest / contractual necessity – security and availability of the Service. | Subprocessor entity location: European Union (regional services). Server / processing location: European Union. Security measures: Industry-standard network security controls, encryption in transit, and access controls. |
| Vercel, Inc. | Website hosting and content delivery network (CDN). Processing of limited technical and usage data required to deliver the Website and web-based Service components. Legal basis: Contractual – operation and delivery of the Service. | Subprocessor entity location: European Union (EU hosting configuration). Server / processing location: European Union. Security measures: Encryption in transit, access controls, and infrastructure security measures implemented by the provider. |
| Google LLC (Google Workspace / Drive) | Storage of customer agreements and contractual documentation. Processing of business contact data and contract-related metadata. Legal basis: Contractual and legal obligation – record-keeping and contract management. | Subprocessor entity location: European Union (EU data region). Server / processing location: European Union. Security measures: ISO 27001 certified infrastructure, encryption at rest and in transit, access controls. |
| A-cube d.o.o. | Local e-invoicing service provider. Processing of invoice data for legally required invoice exchange with national systems. Legal basis: Contractual and legal obligation – statutory e-invoicing compliance. | Subprocessor entity location: European Union. Server / processing location: European Union. Security measures: Compliance with national e-invoicing regulations, secure transmission channels, access controls. |
| Invoice Portal | Local e-invoicing service provider. Processing of invoice data for cross-border or national invoice transmission. Legal basis: Contractual and legal obligation – statutory e-invoicing compliance. | Subprocessor entity location: European Union. Server / processing location: European Union. Security measures: Secure transmission protocols and regulatory compliance safeguards. |
| Link4 Pty Ltd | Local e-invoicing service provider (Australia). Processing of invoice data required for invoice delivery through Australian e-invoicing infrastructure. Legal basis: Contractual and legal obligation – provision of region-specific invoicing services. | Subprocessor entity location: Australia. Server / processing location: Australia. Protection of data: Transfers subject to appropriate safeguards under Chapter V GDPR (e.g. Standard Contractual Clauses). Security measures: Secure transmission channels and contractual confidentiality obligations. |
| 1. PHYSICAL ACCESS CONTROL |
|---|
| The entrance to the common areas and the office is under supervision, with the key to the entrance of the office being held only by the head of the office, the director and any other supervising employees. Cabinets, desks and other office furniture in which personal data carriers are kept and which are located outside the protected areas (corridors, common areas) are locked. The keys are kept by the employee who supervises the individual cabinet or desk at a designated place. Leaving keys in their locks is not allowed. Access to the protected premises is allowed only during regular working hours, whereby access at a different time is only allowed with the permission of the responsible person (supervising employee). Cabinets and desks containing personal data carriers are locked in protected rooms at the end of working hours or after the completion of work after working hours, while computers and other hardware are switched off and physically locked or locked through software. Leaving keys in their locks is not allowed. Employees ensure that persons who are not employees of the company (e.g. customers, maintenance staff, business partners, etc.) do not enter the protected premises unattended, but only with the knowledge / presence of the responsible person. |
| 2. PROTECTION OF SYSTEMS AND DATA CONTAINING PERSONAL DATA |
|---|
| 2.1 Data centres and infrastructure security Personal data processed by the Service Provider is stored exclusively in data centres located within the European Union. The Service Provider uses physically secure data centres that meet recognised international security standards and employ multi-layered physical protection mechanisms. Data centre infrastructure includes redundancy to eliminate single points of failure and to minimise the impact of environmental or technical risks. Power systems are designed to operate continuously and are supported by uninterruptible power supplies (UPS) and backup generators to ensure availability of services 24 hours a day, 7 days a week. Preventative and corrective maintenance processes are implemented in a manner that does not interrupt service availability. 2.2 Network and transmission security Data centres are connected to the internet backbone through high-speed secure connections enabling encrypted data transmission between the Service Provider and users of the Service. All data in transit is protected using HTTPS encryption. The Service Provider employs intrusion detection and prevention measures to protect its external attack surface. These measures include controlling exposure points, implementing intelligent detection mechanisms at data entry points, and deploying automated response technologies to mitigate identified threats. Security incidents are continuously monitored, and the Service Provider’s security personnel respond promptly to detected events. 2.3 Physical and logical access control Access to data centres is strictly restricted to authorised personnel only and is controlled through identification and authorisation mechanisms. On-site security operations are maintained 24/7 to ensure physical protection of infrastructure. Access to systems and personal data is granted exclusively to personnel who require such access to perform their duties. Access rights are assigned according to the principle of least privilege and are reviewed regularly. All personnel receive security and confidentiality training and are bound by confidentiality obligations. Personnel are required to comply with internal security, privacy, and professional conduct policies. 2.4 Data storage, isolation, and retention Personal data is stored in a logically isolated, multi-tenant environment on servers contracted by the Service Provider. Customer Data is segregated through logical controls and, where applicable, replicated across geographically separated data centres to ensure availability and resilience. Personal data is retained only for the duration necessary to fulfil contractual obligations or as required by applicable legal and regulatory requirements. Administrative data (e.g. invoicing, communication, and contract records) is retained in accordance with statutory retention periods. 2.5 Data deletion and decommissioning When storage devices are decommissioned, they are subject to secure data destruction processes. In the event of hardware failure, storage devices are physically destroyed to prevent any unauthorised recovery of data. 2.6 Encryption and cryptographic controls Encryption and hashing mechanisms compliant with NIST-approved standards are used where appropriate. All data in transit is encrypted, backups are encrypted, and data stored in databases is encrypted or hashed depending on the use case (e.g. credentials and authentication data). |
| 3. HARDWARE AND SOFTWARE PROTECTION |
|---|
Measures related to the organisation:
Measures related to human resources:
Measures related to network protection:
Measures related to hardware protection:
Measures related to software protection
(A full list of protective measures and processes from the Data Protection Policy that have been put in place in connection with the Service, shall be made available upon specific request). |